Maximum PC - UK (2020-03)

(Antfer) #1
your data packets move through the Tor network [Image A],
each relay node unpeels one layer of encryption, which points
to the next node, until the final exit node is reached, and the
unencrypted data is passed to the end destination.
>> So, the entry node doesn’t know what the data is or
where it’s going, but keep in mind it does know where you are.
Intermediate relay nodes don’t know where the data is going or
what the data is, while the final exit node doesn’t know where the
data has come from, but it does know the destination, and it can
interrogate the data unless you’re using a secured HTTPS site.
Of course, you also need to bear in mind that the final destination
can know everything about you if you’re not taking care to
anonymize yourself correctly.

3


USING TOR
If we were pedantic, we’d point out that if you’re
truly worried about privacy, you should dump
Windows and switch to Linux, but let’s stay in the real
world. The Tor Project has done a grand job of making
it super-easy to install and run; it’s not much more
complex than going to http://www.torproject.org, grabbing the
installer, running that, and using the Tor Browser.




You can ignore the “Configure” options when Tor is
first run—they’re for connecting via a proxy, and can be
set from within the browser later if need be.
If the Tor browser looks familiar, it’s because it’s
©^ a respin of Firefox, tooled to work directly with Tor,




EF
F.O


RG


,^ C


C^ B


Y^3


.^0 U


S


Take a look at how much
privacy protection Tor and
HTTPS offer when used.
Without either Tor or HTTPS
at every step in the process,
anybody with access to your
connection can potentially

snoop on all your activity,
including the destination
site, your username and
password, your user data,
and your location.
Using HTTPS helps to
protect your user data,

and your username and
password at all stages.
Using Tor masks your
destination site, username
and password, data, and, to a
certain degree, your location.
Adding a VPN would further

protect your location details,
but we should point out that
there could be government
bodies directly accessing
ISP data or the site.com
services via unknown
snooping programs.

TOR AND HTTPS IN USE


SITE.COM
USER/PW
DATA
LOCATION

SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM


  • USER/PW

    • DATA
      LOCATION•




SITE.COM


  • USER/PW

    • DATA
      LOCATION•




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•
USER/PW•
DATA•
LOCATION

SITE.COM•
USER/PW•
DATA•
LOCATION•

SITE.COM•


  • USER/PW

    • DATA
      LOCATION•




KEY
HIDDEN BY TOR
HIDDEN BY HTTPS
INTERNET CONNECTION
EAVESDROPPING
DATA SHARING
TOR NETWORK

maximumpc.com MAR 2020 MAXIMUMPC 61

Free download pdf